First published: Thu Oct 02 2014(Updated: )
The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 4.4.x and earlier does not properly check supervisor mode permissions, which allows local HVM users to cause a denial of service (guest crash) or gain guest kernel mode privileges via vectors involving an (1) HLT, (2) LGDT, (3) LIDT, or (4) LMSW instruction.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen Xen | <=4.4.0 | |
Xen Xen | =3.0.2 | |
Xen Xen | =3.0.3 | |
Xen Xen | =3.0.4 | |
Xen Xen | =3.1.3 | |
Xen Xen | =3.1.4 | |
Xen Xen | =3.2.0 | |
Xen Xen | =3.2.1 | |
Xen Xen | =3.2.2 | |
Xen Xen | =3.2.3 | |
Xen Xen | =3.3.0 | |
Xen Xen | =3.3.1 | |
Xen Xen | =3.3.2 | |
Xen Xen | =3.4.0 | |
Xen Xen | =3.4.1 | |
Xen Xen | =3.4.2 | |
Xen Xen | =3.4.3 | |
Xen Xen | =3.4.4 | |
Xen Xen | =4.0.0 | |
Xen Xen | =4.0.1 | |
Xen Xen | =4.0.2 | |
Xen Xen | =4.0.3 | |
Xen Xen | =4.0.4 | |
Xen Xen | =4.1.0 | |
Xen Xen | =4.1.1 | |
Xen Xen | =4.1.2 | |
Xen Xen | =4.1.3 | |
Xen Xen | =4.1.4 | |
Xen Xen | =4.1.5 | |
Xen Xen | =4.1.6.1 | |
Xen Xen | =4.2.0 | |
Xen Xen | =4.2.1 | |
Xen Xen | =4.2.2 | |
Xen Xen | =4.2.3 | |
Xen Xen | =4.3.0 | |
Xen Xen | =4.3.1 | |
Xen Xen | =4.4.0 | |
Xen Xen | =4.4.0-rc1 | |
Debian Debian Linux | =7.0 | |
Fedoraproject Fedora | =19 | |
Fedoraproject Fedora | =20 | |
openSUSE openSUSE | =12.3 | |
openSUSE openSUSE | =13.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.